Cyber Ethics:
Rules for Using the WebWe all have heard of ethics. According to Webster's II New College Dictionary (1995), ethics is the rules or standards governing the conduct of a person or the members of a profession. As Winn Schwartau (2001) stated "ethics is also about understanding how your actions will affect other people". Cyber-ethics is the ethical decisions we make when using the Internet. We are tasked to use the Internet on a daily basis and we task students to use the Internet regularly, but to use it properly we must adhere to ethics. Ethics is not a law but your moral code. We must know how to avoid plagiarism, know the acceptable use of the Internet, and we must be familiar with Censorship in order to know what moral standards to follow with the World Wide Web. Plagiarism, or as Steven Gardiner (2001) calls it cyber cheating is the new twist for cheating. Over the years plagiarism has become much harder to detect. But, how do you know when a student has copied his work from online, and not give the proper credit to the rightful owner? I remember working on my undergrad and to prevent cyber cheating my professor only allowed us to use a limited number of Internet cites. The rest were to be from physical books from the library. I can see why a student would copy a paper over writing one. It only takes a few minutes to search the web, cut and paste, and then add you name. The time they saved in research just added more time for them to do the things that are fun. The second way to detect cyber cheating according to Gardiner (2001) is that if you task a student to write a paper is MLA and the paper is in APA it is almost a given that the paper was not written by the student. As most teachers are parents or have that parental instinct, they are aware of the capabilities of their students. So another way to determine if the paper is a fake is ask yourself if that student could really produce that quality of work. To understand the appropriate use...

...trade fairs and conferences, market information, new innovations and technical support, and even dispense advice on love and relationships matters.
* · Inexhaustible Education
The Internet has become an essential propagator of knowledge, both through free as well as paid services. The credibility of this form of education and whether it is safe, secure, and trustworthy, is usually proven through the quality and authenticity of content presented by each website.
* · Entertainment for Everyone
Entertainment is one of the foremost reasons why people prefer surfing the Web. In fact, the Internet has gained much success by marketing for several multifaceted entertainment industries. Finding the latest updates about celebrities and exploring lifestyle websites have become day-to-day activities of many Internet consumers. On the other hand, even celebrities are using the Internet effectively for promoting their cause and for keeping their fans happy.
* · Social Networking and Staying Connected
One cannot imagine a social life without Facebook or Twitter. These portals have become our means to stay connected with friends and family, and stay in touch with the latest happenings in the world.
* · Online Services and E-commerce
Thanks to numerous monetary services, we can perform all our financial transactions online. We can book tickets for a movie, transfer funds, pay utility bills and taxes...

...CyberEthics
The chapter 12 narrative by Joseph Menn, “Hackers Live by Own Code”, establishes the claim that hackers have several ways to justify their actions. In order to illustrate this claim Menn uses the example of Mary Ann Davidson. It all started when Davison, the chief security officer for Oracle Corp., received a fax from a hacker in the Middle East stating that he was able to pilfer information from corporations such as Boeing Co., Ford Motor Co. and the CIA (Lawrence Hinman, 463). It is no surprise that once Davidson was aware of this she took immediate action and contacted the hacker. However, what was surprising is that after she contacted the hacker, Davidson described him as a “nice guy” (Hinman, 463). The significance of this example is that Menn is emphasizing the point that despite public opinion hackers are just like any ordinary person.
Menn continues to elaborate on this idea by highlighting the so-called purpose of a hacker’s actions, which is to help by making “software more secure” (Hinman, 463). In their minds hackers believe they are helping because they are pointing out software’s weaknesses such as loopholes that allow them easy access to private information. Menn describes this concept by describing hackers as “the sort of people who set aside the instruction manual and take a machine apart to see how it works” (463). This description eliminates the negative image one typically associates with hackers, and...

...Assignment 3 – CyberEthics
The Right to Privacy
Jessica Wilcox
103107608
July 29, 2012
CyberEthics – The Right to Privacy
Privacy is the right to be free from disturbance in one’s private life or private affairs. With the introduction of social networks privacy is now harder to achieve. People disclose personal information about themselves that they wish to share with friends and family that they wish to be kept private, but this does not always happen. As a user on a social networking page, you have the right to your own privacy settings which you can change and hide certain things from certain people. Even with this setting, privacy may still be at risk. Content on social networking sites have put people’s reputation, jobs, and much more at risk. Information on these sites is now being used as evidence in lawsuits and grounds for being fired or even being hired. People think that the information they disclose is their right to privacy, but it doesn’t seem like the case now a days. Since we have a right to privacy in about the information we share with family and friends in real space I think that we should have a right to privacy if we share this same information on Facebook or other places online such a Second Life.
Being able to share personal information with friends and family is a right, and we expect privacy while doing so. Privacy has become the most important human rights issue in this modern...

...can be easily attained by the most infinitesimal of minds. This is why it is so important that we establish an ethical code for the web. With a code of internet ethics, we can maximize the resourceful information found on the web and minimize the duplication of accredited entries. Recognizing an individual for his or her work is of great importance, so much that www.acm.org emphasizes it. This website states that it is appropriate to “give proper credit for intellectual property” in its code of ethics. The internet is made up of multiple waves of information that can be easily attained by the most infinitesimal of minds. This is why it is so important that we establish an ethical code for the web. With a code of internet ethics, we can maximize the resourceful information found on the web and minimize the duplication of accredited entries. Recognizing an individual for his or her work is of great importance, so much that www.acm.org emphasizes it. This website states that it is appropriate to “give proper credit for intellectual property” in its code of ethics. The internet is made up of multiple waves of information that can be easily attained by the most infinitesimal of minds. This is why it is so important that we establish an ethical code for the web. With a code of internet ethics, we can maximize the resourceful information...

...﻿Chapter One-Ethics in Funeral Service
How does the Golden Rule apply to funeral service?
There is no 'right vs. wrong' when it comes to showing reverence for the dead or comforting the grieving. Perhaps it is better to think in terms of appropriate vs. inappropriate, or thoughtful vs. thoughtless. When you're not sure what to do, the best course of action is always the Golden Rule: ”treat others the way you wish to be treated.” Under this ethical code, funeral directors, cremation societies and direct disposers are expected to treat with the greatest respect the clients they serve, the deceased with whom they are entrusted; the general public who seek information; the cultural values, religious traditions, and familial relationships of all; the private information they are given; and the laws of the state; and the profession in which they serve. The death of a loved one is an incredibly difficult time, and a family needs to feel supported and cared for when they choose a funeral professional to take care of a loved one. Ethical treatment of the deceased is the highest priority for cremation societies, funeral homes and cemeteries. It is an honor and a sacred duty to help a family when they have lost a loved one. It is a spiritual and reverent experience to care for those who have died. Those in Funeral Service are committed to leading the way in funeral industry ethics, and showing the communities, in which they...

...﻿When determining the status of morality there is three different options. Morality may be the different between objectives, relativistic, or it may be a complex set of rules. Moral nihilists are like relativists by denying ethical objectivism however, relativists believe in moral goodness, duty and virtue and nihilists don’t. Error theorists and expressivism are both forms of moral nihilism. Error theorists believe “our moral judgments are always mistaken”. Expressivists don’t agree and also deny that our moral claims can ever offer an accurate take on reality. (307)
Error theory and expressivism are two forms of moral nihilism. Error theorists believe “our moral judgments are always mistaken”. (307) While expressivists deny those beliefs and deny, “that our moral claims can never offer an accurate take on reality”. (307) The error theory is made of three doubts/claims.
The first is “there are no moral features in this world”. Error theorists believe that nothing is morally good or bad, or right and wrong. Exemplified in the book many scientific qualities in the world (liquids, being three feet long, carbon based chemicals) but none of them contain moral features. The next doubt of error theorists is no moral judgments are true. There are no moral facts so certain statements made cannot be true. The third corresponds to the second doubt, “our sincere moral judgments try, but always fail, to describe the moral features of things”. Since there are no moral...